Assignment: Lab: Ethical Hacking: Performing passive reconnaissance on a target organization

Perform research on the Internet to understand security threats and attack vectors in a Bring Your Own Device (BYOD) scenario. How could passive reconnaissance be done in this type of environment? What security controls would you recommend implementing to avoid this type of passive reconnaissance?

Competencies Measured

By successfully completing this assignment, you will demonstrate your proficiency in the following course competencies and assignment criteria.

  • Competency 1: Describe the core concepts, technologies, components, and security issues related to mobile and wireless networks.
    • Apply your internet research findings to analyze core concepts and applied technologies regarding security threats and attack vectors in a Bring Your Own Device (BYOD) context.
  • Competency 3: Analyze how mobile systems operate to facilitate secure data access and voice.
    • Describe performing passive reconnaissance on a target organization in a lab context.
    • Recommend security controls to implement to avoid identified passive reconnaissance in a Bring Your Own Device (BYOD) context.
  • Competency 4: Apply network defense tools to identify and mitigate mobile network security concerns.
    • Complete the lab tasks as described in the lab learning objectives.
    • Describe how passive reconnaissance can be applied in a Bring Your Own Device (BYOD) context.
  • Competency 6: Exhibit proficiency in writing, critical thinking, and research topic areas in real-life data communication networks.
    • Convey clear meaning through appropriate word choice and usage.
    • Organize content so ideas flow logically with smooth transitions.


Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.